Secure transmission scheme based on joint radar and communication in mobile vehicular networks

Y Yao, F Shu, Z Li, X Cheng… - IEEE transactions on …, 2023 - ieeexplore.ieee.org
Vehicle-to-vehicle (V2V) communication applications face significant challenges to security
and privacy since all types of possible breaches are common in connected and autonomous …

[HTML][HTML] Beyond encryption: Exploring the potential of physical layer security in UAV networks

F Xu, S Ahmad, M Ahmed, S Raza, F Khan, Y Ma… - Journal of King Saud …, 2023 - Elsevier
Unmanned aerial vehicles (UAVs) have attracted much attention for civil and military uses
because of their high mobility and adaptable deployment capabilities in open spaces. They …

A thorough examination of smart city applications: Exploring challenges and solutions throughout the life cycle with emphasis on safeguarding citizen privacy

L Xia, DT Semirumi, R Rezaei - Sustainable Cities and Society, 2023 - Elsevier
With the increasing use of artificial intelligence (AI) and the Internet of Things (IoTs), it is
crucial to acknowledge the potential security and privacy issues that arise from these …

[HTML][HTML] Analytical study of nonlinear models using a modified Schrödinger's equation and logarithmic transformation

C Zhu, SA Idris, MEM Abdalla, S Rezapour, S Shateyi… - Results in Physics, 2023 - Elsevier
Optical solitons are special waves that maintain their shape while traveling. Hence, solitary
optical waves have great significance when it comes to representing pulse propagation …

The optimization of nodes clustering and multi-hop routing protocol using hierarchical chimp optimization for sustainable energy efficient underwater wireless sensor …

S He, Q Li, M Khishe, A Salih Mohammed… - Wireless networks, 2024 - Springer
The design of underwater wireless sensor networks (UWSNs) faces many challenges,
including power consumption, storage, battery life, and transmission bandwidth. UWSNs …

Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions

R Uddin, SAP Kumar, V Chamola - Ad Hoc Networks, 2024 - Elsevier
Edge computing has emerged as the dominant communication technology connecting IoT
and cloud, offering reduced latency and harnessing the potential of edge devices. However …

A quality-of-service-aware service composition method in the internet of things using a multi-objective fuzzy-based hybrid algorithm

M Hamzei, S Khandagh, N Jafari Navimipour - Sensors, 2023 - mdpi.com
The Internet of Things (IoT) represents a cutting-edge technical domain, encompassing
billions of intelligent objects capable of bridging the physical and virtual worlds across …

CANAttack: Assessing Vulnerabilities within Controller Area Network

D Oladimeji, A Rasheed, C Varol, M Baza… - Sensors, 2023 - mdpi.com
Current vehicles include electronic features that provide ease and convenience to drivers.
These electronic features or nodes rely on in-vehicle communication protocols to ensure …

[HTML][HTML] A novel framework for capacitated SDN controller placement: Balancing latency and reliability with PSO algorithm

GD Singh, V Tripathi, A Dumka, RS Rathore… - Alexandria Engineering …, 2024 - Elsevier
Abstract Software Defined Networking (SDN) is a new network architecture theoretical
framework, which based on the partition of the control plane and the data plane. Some of the …

Task offloading in Internet of Things based on the improved multi-objective aquila optimizer

M Nematollahi, A Ghaffari, A Mirzaei - Signal, Image and Video Processing, 2024 - Springer
Abstract The Internet of Things (IoT) is a network of tens of billions of physical devices that
are all connected to each other. These devices often have sensors or actuators, small …